0 / 60 seg.

Which cyberattack aims to exhaust an application's resources, making the application unavailable to legitimate users?